ESB-2018.3459 - [Linux][Debian] gthumb: Multiple vulnerabilities 2018-11-06

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3459
                    [DLA 1567-1] gthumb security update
                              6 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gthumb
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-18718  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/11/msg00002.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running gthumb check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : gthumb
Version        : 3:3.3.1-2.1+deb8u1
CVE ID         : CVE-2018-18718
Debian Bug     : #912290


CVE-2018-18718 - CWE-415: Double Free
The product calls free() twice on the same memory address, potentially
leading to modification of unexpected memory locations.

There is a suspected double-free bug with
static void add_themes_from_dir() dlg-contact-sheet.c. This method
involves two successive calls of g_free(buffer) (line 354 and 373),
and is likely to cause double-free of the buffer. One possible fix
could be directly assigning the buffer to NULL after the first call
of g_free(buffer). Thanks Tianjun Wu
https://gitlab.gnome.org/GNOME/gthumb/issues/18

For Debian 8 "Jessie", this problem has been fixed in version
3:3.3.1-2.1+deb8u1

We recommend that you upgrade your gthumb packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=t5bE
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qFAB
-----END PGP SIGNATURE-----

« Back to bulletins